Matching Items (5)
Filtering by

Clear all filters

148445-Thumbnail Image.png
Description

This is a test plan document for Team Aegis' capstone project that has the goal of mitigating single event upsets in NAND flash memory caused by space radiation.

ContributorsForman, Oliver Ethan (Co-author) / Smith, Aiden (Co-author) / Salls, Demetra (Co-author) / Kozicki, Michael (Thesis director) / Hodge, Chris (Committee member) / Electrical Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
157577-Thumbnail Image.png
Description
Emerging from years of research and development, the Internet-of-Things (IoT) has finally paved its way into our daily lives. From smart home to Industry 4.0, IoT has been fundamentally transforming numerous domains with its unique superpower of interconnecting world-wide devices. However, the capability of IoT is largely constrained by the

Emerging from years of research and development, the Internet-of-Things (IoT) has finally paved its way into our daily lives. From smart home to Industry 4.0, IoT has been fundamentally transforming numerous domains with its unique superpower of interconnecting world-wide devices. However, the capability of IoT is largely constrained by the limited resources it can employ in various application scenarios, including computing power, network resource, dedicated hardware, etc. The situation is further exacerbated by the stringent quality-of-service (QoS) requirements of many IoT applications, such as delay, bandwidth, security, reliability, and more. This mismatch in resources and demands has greatly hindered the deployment and utilization of IoT services in many resource-intense and QoS-sensitive scenarios like autonomous driving and virtual reality.

I believe that the resource issue in IoT will persist in the near future due to technological, economic and environmental factors. In this dissertation, I seek to address this issue by means of smart resource allocation. I propose mathematical models to formally describe various resource constraints and application scenarios in IoT. Based on these, I design smart resource allocation algorithms and protocols to maximize the system performance in face of resource restrictions. Different aspects are tackled, including networking, security, and economics of the entire IoT ecosystem. For different problems, different algorithmic solutions are devised, including optimal algorithms, provable approximation algorithms, and distributed protocols. The solutions are validated with rigorous theoretical analysis and/or extensive simulation experiments.
ContributorsYu, Ruozhou, Ph.D (Author) / Xue, Guoliang (Thesis advisor) / Huang, Dijiang (Committee member) / Sen, Arunabha (Committee member) / Zhang, Yanchao (Committee member) / Arizona State University (Publisher)
Created2019
158005-Thumbnail Image.png
Description
The traditional access control system suffers from the problem of separation of data ownership and management. It poses data security issues in application scenarios such as cloud computing and blockchain where the data owners either do not trust the data storage provider or even do not know who would have

The traditional access control system suffers from the problem of separation of data ownership and management. It poses data security issues in application scenarios such as cloud computing and blockchain where the data owners either do not trust the data storage provider or even do not know who would have access to their data once they are appended to the chain. In these scenarios, the data owner actually loses control of the data once they are uploaded to the outside storage. Encryption-before-uploading is the way to solve this issue, however traditional encryption schemes such as AES, RSA, ECC, bring about great overheads in key management on the data owner end and could not provide fine-grained access control as well.

Attribute-Based Encryption (ABE) is a cryptographic way to implement attribute-based access control, which is a fine-grained access control model, thus solving all aforementioned issues. With ABE, the data owner would encrypt the data by a self-defined access control policy before uploading the data. The access control policy is an AND-OR boolean formula over attributes. Only users with attributes that satisfy the access control policy could decrypt the ciphertext. However the existing ABE schemes do not provide some important features in practical applications, e.g., user revocation and attribute expiration. Furthermore, most existing work focus on how to use ABE to protect cloud stored data, while not the blockchain applications.

The main objective of this thesis is to provide solutions to add two important features of the ABE schemes, i.e., user revocation and attribute expiration, and also provide a practical trust framework for using ABE to protect blockchain data. To add the feature of user revocation, I propose to add user's hierarchical identity into the private attribute key. In this way, only users whose identity is not revoked and attributes satisfy the access control policy could decrypt the ciphertext. To add the feature of attribute expiration, I propose to add the attribute valid time period into the private attribute key. The data would be encrypted by access control policy where all attributes have a temporal value. In this way, only users whose attributes both satisfy the access policy and at the same time these attributes do not expire,

are allowed to decrypt the ciphertext. To use ABE in the blockchain applications, I propose an ABE-enabled trust framework in a very popular blockchain platform, Hyperledger Fabric. Based on the design, I implement a light-weight attribute certificate authority for attribute distribution and validation; I implement the proposed ABE schemes and provide a toolkit which supports system setup, key generation,

data encryption and data decryption. All these modules were integrated into a demo system for protecting sensitive les in a blockchain application.
ContributorsDong, Qiuxiang (Author) / Huang, Dijiang (Thesis advisor) / Sen, Arunabha (Committee member) / Doupe, Adam (Committee member) / Arizona State University (Publisher)
Created2020
165223-Thumbnail Image.png
Description

The purpose of this research is to better understand the potential use environment of a Dendritic Identifier within the current leafy green supply chain, including the exploration of potential costs of implementation as well as non-economic costs. This information was collected through an extensive review of literature and through the

The purpose of this research is to better understand the potential use environment of a Dendritic Identifier within the current leafy green supply chain, including the exploration of potential costs of implementation as well as non-economic costs. This information was collected through an extensive review of literature and through the engagement in in-depth interviews with professionals that work in the growing, distribution, and processing of leafy greens. Food safety in the leafy green industry is growing in importance in the wake of costly outbreaks that resulted and recalls and lasting market damage. The Dendritic Identifier provides a unique identification tag that is unclonable, scannable, and compatible with blockchain systems. It is a digital trigger that can be implemented throughout the commercial leafy green supply chain to increase visibility from farm to fork for the consumer and a traceability system for government agencies to trace outbreaks. Efforts like the Food Safety Modernization Act, the Leafy Green Marketing Agreement, and other certifications aim at establishing science-based standards regarding soil testing, water, animal feces, imports, and more. The leafy green supply chains are fragmented in terms of tagging methods and data management services used. There are obstacles in implementing Dendritic Identifiers in that all parties must have systems capable of joining blockchain networks. While there is still a lot to take into consideration for implementation, solutions like the IBM Food Trust pose options for a more fluid transfer of information. Dendritic Identifiers beat out competing tagging technologies in that they work with cellphones, are low cost, and are blockchain compatible. Growers and processors are excited by the opportunity to showcase their extensive food safety measures. The next step in understanding the use environment is to focus on the retail distribution and the retailer specifically.

ContributorsMin, Eleanor (Author) / Manfredo, Mark (Thesis director) / Kozicki, Michael (Committee member) / Barrett, The Honors College (Contributor) / Department of Information Systems (Contributor)
Created2022-05
165224-Thumbnail Image.png
Description

The purpose of this research is to better understand the potential use environment of a Dendritic Identifier within the current leafy green supply chain, including the exploration of potential costs of implementation as well as non-economic costs. This information was collected through an extensive review of literature and through the

The purpose of this research is to better understand the potential use environment of a Dendritic Identifier within the current leafy green supply chain, including the exploration of potential costs of implementation as well as non-economic costs. This information was collected through an extensive review of literature and through the engagement in in-depth interviews with professionals that work in the growing, distribution, and processing of leafy greens. Food safety in the leafy green industry is growing in importance in the wake of costly outbreaks that resulted and recalls and lasting market damage. The Dendritic Identifier provides a unique identification tag that is unclonable, scannable, and compatible with blockchain systems. It is a digital trigger that can be implemented throughout the commercial leafy green supply chain to increase visibility from farm to fork for the consumer and a traceability system for government agencies to trace outbreaks. Efforts like the Food Safety Modernization Act, the Leafy Green Marketing Agreement, and other certifications aim at establishing science-based standards regarding soil testing, water, animal feces, imports, and more. The leafy green supply chains are fragmented in terms of tagging methods and data management services used. There are obstacles in implementing Dendritic Identifiers in that all parties must have systems capable of joining blockchain networks. While there is still a lot to take into consideration for implementation, solutions like the IBM Food Trust pose options for a more fluid transfer of information. Dendritic Identifiers beat out competing tagging technologies in that they work with cellphones, are low cost, and are blockchain compatible. Growers and processors are excited by the opportunity to showcase their extensive food safety measures. The next step in understanding the use environment is to focus on the retail distribution and the retailer specifically.

ContributorsMin, Eleanor (Author) / Manfredo, Mark (Thesis director) / Kozicki, Michael (Committee member) / Barrett, The Honors College (Contributor) / Department of Information Systems (Contributor)
Created2022-05